National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Information Security Analyst (ASM/VM)

Cirrus Logic, Inc.
Edinburgh
1 week ago
Create job alert

For over four decades, Cirrus Logic has been propelled by the top engineers in mixed-signal processing. Our rockstar team thrives on solving complex challenges with innovative end-user solutions for the world's top consumer brands. Cirrus Logic is also known for its award-winning culture, built on a foundation of inclusion and fairness, meaningful community engagement, and delivering enjoyable employee experiences at every turn. But we couldn’t do it without our extraordinary workforce – and that’s where you come in. Join our team and help us continue to make Cirrus Logic an exceptional place to grow your career!
We are seeking a highly motivated, seasoned security professional to join Information Security as a Senior Attack Surface Management / Vulnerability Management Information Security Analyst. You will be responsible for managing the scanning architecture, as well as the program to identify, analyze, prioritize, and mitigate security vulnerabilities in our digital assets to enhance cybersecurity and protect sensitive data. This role supports business strategy in a dynamic environment.
Responsibilities: Vulnerability Assessment: Conduct regular vulnerability assessments to identify security weaknesses in our systems, applications, and network infrastructure.
Risk Analysis: Analyze and prioritize vulnerabilities based on risk level and potential impact on the organization.
Mitigation Strategies: Develop and implement effective mitigation strategies to address identified vulnerabilities and reduce attack surfaces.
Incident Response: Collaborate with the incident response team to investigate and respond to security incidents, ensuring swift resolution and minimizing damage.
Security Tools: Manage and maintain security tools and technologies used for vulnerability management, including scanning tools.
Security Policies: Develop and enforce security policies, standards, and best practices to ensure compliance with industry regulations and internal security requirements.
Reporting: Prepare detailed reports on vulnerability assessment findings, mitigation efforts, and overall security posture for senior management.
Security: Engage in the design and support of all aspects of an information security program, including Governance Risk & Compliance, Security Operations, and Security Engineering with hands on engineering and administration of security tools, such as CrowdStrike, Qualys, and Splunk in collaboration with fellow security and IT professionals.
Required Skills and Qualifications: Demonstrable experience across multiple cybersecurity domains including vulnerability management, risk management, network security, Splunk engineering, and incident response.
Experience analyzing impact of vulnerabilities and designing solutions across Windows, Mac, Linux, Cloud, Network, Labs, and OT.
Technical experience designing solutions across Linux, Mac, and Windows platforms.
Strong knowledge of common vulnerabilities and attack vectors, as well as security best practices.
One or more of the following certifications is preferred: Certified Information Systems Security Professional (CISSP); Systems Security Certified Practitioner (SSCP); GIAC Certified Intrusion Analyst (GCIA).
Bachelor’s degree in cybersecurity or have demonstrated ability as a security professional in a globally dispersed enterprise.
Experience working in high-tech, engineering, or semiconductor industry is beneficial.
Effective working with a globally dispersed team across multiple time zones to deliver solutions on time.
Experience with security industry frameworks, such as NIST CSF, ISO 27000 series, FAIR risk analysis, and privacy regulations.
Proficiency with security tools such as Qualys, Crowdstrike, and Splunk.
Experience with incident response and threat hunting.
Excellent analytical and problem-solving skills.
Effective communication and interpersonal skills, with the ability to effectively convey technical information to both technical and non-technical stakeholders.
Executive presence and comfortable engaging with leaders across the company to facilitate balanced risk discussions and decision making.
This position is in Edinburgh, UK.
This is a hybrid on-site position and will follow a 2+ day in-office work schedule, with in-office days based on business needs and team preference. You must be based within commutable distance of the work location listed on the job posting, or willing to relocate prior to beginning employment with Cirrus Logic.

#J-18808-Ljbffr

Related Jobs

View all jobs

Senior Information Security Analyst, SOC (Manchester)

Senior Information Security Analyst

Senior Information Security Analyst, SOC (Manchester)

Senior Information Security Specialist (Manchester)

Senior Information Security Specialist (Manchester)

Senior Information Security Specialist (Stoke)

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.